CN105451224B - Destroying method - Google Patents

Destroying method Download PDF

Info

Publication number
CN105451224B
CN105451224B CN201410406620.5A CN201410406620A CN105451224B CN 105451224 B CN105451224 B CN 105451224B CN 201410406620 A CN201410406620 A CN 201410406620A CN 105451224 B CN105451224 B CN 105451224B
Authority
CN
China
Prior art keywords
mobile terminal
imsi
broadcast
imei
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410406620.5A
Other languages
Chinese (zh)
Other versions
CN105451224A (en
Inventor
高林花
姬峰
李飞
何代钦
陈正伟
李燕舞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing BNC Technologies Co Ltd
Original Assignee
Beijing BNC Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing BNC Technologies Co Ltd filed Critical Beijing BNC Technologies Co Ltd
Priority to CN201410406620.5A priority Critical patent/CN105451224B/en
Publication of CN105451224A publication Critical patent/CN105451224A/en
Application granted granted Critical
Publication of CN105451224B publication Critical patent/CN105451224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of destroying method, method includes:After user is successfully logged in for the first time by mobile terminal, IMEI and IMSI are stored in local, and the first broadcast is added in alarm clock management timer and is broadcasted;It is set as true by variable is successfully logged in;The radio receiver of mobile terminal receives the first broadcast, starts the service of destruction;Radio receiver receives the booting self-starting broadcast of system transmission;Judge successfully to log in whether variable is true, then sends the second broadcast in this way;When radio receiver receives the second broadcast, SIM is monitored;Such as None- identified to SIM or the 2nd IMEI and the first IMEI is inconsistent or the 2nd IMSI and the first IMSI is inconsistent, is destroyed.The destroying method of the present invention can be carried out easily using local detection from destruction, or started using server side and destroyed, the information destroying that mobile terminal is preserved, so as to be effectively protected the information security of mobile terminal.

Description

Destroying method
Technical field
The present invention relates to information security field more particularly to a kind of destroying methods.
Background technology
With the development of the times, information technology is maked rapid progress, and demand of the people to information is also increasing.And in informationization Society in, the importance and economic value of information are also higher and higher.
But therefore information security issue also generates, particularly with the high industry of some security requirements or field, work as institute The mobile terminal loss used is found by people may lead to the problem of information loss and divulge a secret.
Invention content
It is uneasy when finding to realize the purpose of the present invention is in view of the drawbacks of the prior art, providing a kind of destroying method When full situation, startup is destroyed, and can effectively prevent information leakage.
To achieve the above object, the present invention provides a kind of destroying method, the method includes:
After user is successfully logged in for the first time by mobile terminal, by First International's mobile device identification code of the mobile terminal IMEI and First International mobile identification number IMSI is stored in local, and the first broadcast is added to alarm clock management In AlarmManager timers and broadcast first broadcast;Variable, which will be successfully logged in, when user is switched on is set as true;
The radio receiver of mobile terminal receives first broadcast, starts the service of destruction;
After booting, the radio receiver receives the booting self-starting broadcast of system transmission;
Judge whether the successfully login variable is true, then sends the second broadcast in this way;
When the radio receiver receives second broadcast, client identification module SIM in the mobile terminal is monitored;
If None- identified is to the SIM, or the 2nd IMEI of the mobile terminal that gets and locally preserves First IMEI is inconsistent, or the 2nd IMSI got and the inconsistent then described shiftings of the first IMSI locally preserved Dynamic terminal is destroyed.
It is further, described that then the second broadcast of transmission specifically includes in this way:Second broadcast is added to alarm clock management In, second broadcast is sent with first time interval.
Further, the mobile terminal destroy specifically including:The letter that the mobile terminal will be preserved locally Breath is deleted.
Further, the method further includes:The mobile terminal is true by traffic sign placement is destroyed, and when will destroy Between be sent to the server.
The present invention also provides a kind of destroying method, the method includes:
Server receives destruction and asks and preserve in lists, and the destruction request includes User ID, the user ID is bound with user password, IMIS and IMEI phases;
Mobile terminal judges that it is no to destroy mark, sends to the server and destroys query messages, the destruction inquiry disappears Breath includes the first IMSI and the first IMEI of the mobile terminal;
The server searches bound User ID according to the first IMSI and the first IMEI;
The server finds first User ID in the list, the user that will be preserved in the list Corresponding 2nd IMSI of ID, and encrypted 2nd IMSI is sent to the mobile terminal;
The mobile terminal judges that encrypted 2nd IMSI is consistent with local encrypted first IMSI, then institute Mobile terminal is stated to be destroyed.
Further, the server receives destruction and asks and further include after preserving in lists, by the user ID is set as destruction state.
Further, the first IMSI and the first IMEI for destroying the mobile terminal that query messages include is specific For encrypted first IMSI and encrypted first IMEI.
According to the method described in claim 5, it is characterized in that, the server is according to the first IMSI and first IMEI further includes whether legal verifying the first IMSI and the first IMEI before searching bound User ID.
Further, the mobile terminal destroy specifically including:The letter that the mobile terminal will be preserved locally Breath is deleted.
Further, the method further includes:The mobile terminal is true by traffic sign placement is destroyed, and when will destroy Between be sent to the server.
The destroying method of the present invention can be carried out easily using local detection from destruction, or be started using server side It destroys, the information destroying that mobile terminal is preserved, so as to be effectively protected the information security of mobile terminal.
Description of the drawings
Fig. 1 is the flow chart of inventive pin damage method embodiment one;
Fig. 2 is the flow chart of inventive pin damage method embodiment two.
Specific implementation mode
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
The destroying method of the present invention is exactly the safety for ensureing user information using auto-destruct or remote destroying, is prevented Mobile terminal causes the accidental release of information after losing.
There are two types of tupe, the first patterns to be bound suitable for terminal for present invention tool, and user successfully logs in for the first time After terminal software, equipment international mobile subscriber identity (International Mobile are obtained SubscriberIdentification Number, IMSI), international mobile equipment identification number (International Mobile EquipmentIdentification Number, IMEI) it information and is stored in SharedPreferences.Destroy service According to having preserved facility information and existing equipment IMEI, IMSI are compared when operation, it is determined whether need to destroy.
Fig. 1 is the flow chart of inventive pin damage method embodiment one, as shown, the present embodiment specifically includes following step Suddenly:
Step 101, after user is successfully logged in for the first time by mobile terminal, by the first IMEI of mobile terminal and the first IMSI It is stored in local;And the first broadcast is added in alarm clock management AlarmManager timers and is broadcasted;
Step 102, it will successfully log in variable and be set as true;
Step 103, the radio receiver of mobile terminal receives the first broadcast, starts the service of destruction;
Specifically, when user successfully logs in for the first time, IMSI, IMEI information preservation of equipment are existed In SharedPreferences, while the variable successedLogin that will be indicated as the logged software of work(is set as true.With After the first time manual entry success of family, the first broadcast Constants.ACTION_ACTIVATE_DESTROY is added to alarm clock It manages in AlarmManager, and the broadcast is constantly sent with the 120 seconds time of interval, radio receiver receives first broadcast Afterwards, start the service of destruction immediately.
Step 104, after booting, radio receiver receives the booting self-starting broadcast of system transmission;
Step 105, judge successfully to log in whether variable is true, then send the second broadcast in this way;
Specifically, mobile terminal is switched on again later, then receiving booting self-starting using radio receiver broadcasts, i.e., Android.intent.action.BOOT_COMPLETED broadcast, first determine whether variable successedLogin value whether be Second broadcast is just that Constants.ACTION_ACTIVATE_DESTROY is added to alarm clock pipe if meeting condition by true It manages in AlarmManager, and the broadcast is constantly sent with first time interval, such as 120 seconds time.
Step 106, when radio receiver receives the second broadcast, client identification module in mobile terminal is monitored (Subscriber Identity Module, SIM);
Specifically, after radio receiver receives the second broadcast, starts the service of destruction immediately, monitor the state of SIM card.
Step 107, it if None- identified is to SIM, or the 2nd IMEI of the mobile terminal got and locally preserves First IMEI is inconsistent, or the 2nd IMSI got and the inconsistent then mobile terminals of the first IMSI that locally preserve are into marketing Ruin processing.
Specifically, if None- identified to SIM card, e.g. without SIM card state, or has SIM card state, but obtain To the first IMSI that is preserved with SharedPreferences of the 2nd IMSI or the 2nd IMEI information or the first IMEI information differ It causes, is switched on and destroys certainly.
The information deletion that exactly will locally preserve is destroyed, such as deletes the information in database file, is emptied All variables (including user account, password, IMEI, IMSI, setting option) that SharedPreferences is preserved, then by pin It ruins mark destroy and is set as true, be saved into SharedPreferences.
If network is normal, the software destruction time is sent to server.Current process is killed, and be currently running View layers, service layer processes.
If next time wishes to log on, it can prompt that " software self-destruction, is reinstalled after please unloading!", It will be unable to enter this application, software is forbidden to use.
Second of tupe of the present invention is bound suitable for server end:Server end typing user information when It waits, User ID, password, IMSI, IMEI is bound, when having remote destroying request, can be gone to look into according to IMSI, IMEI The user that needs are destroyed is looked for, corresponding destroy then is carried out and operates.
Fig. 2 is the flow chart of inventive pin damage method embodiment two, as shown, the present embodiment specifically includes following step Suddenly:
Step 201, server receives destruction and asks and preserve in lists, and it includes User ID, user to destroy request ID is bound with user password, IMIS and IMEI phases;
Specifically, if having destruction to require the user of some binding, the user is chosen in dispatching desk, sends to destroy and ask It asks CC2SS_KILL_USR_REQ to server, destroys request and carry destroyed User ID.
After server receives the destruction request of dispatching desk, the PTT_HEAP.ZXYongHu_Record in these three tables, PTT_HEAP.YongHu_Record, PTT_DISK.YongHu_Info find the user, and the destruction shape of the user is arranged State.
Step 202, mobile terminal judges that it is no to destroy mark, sends to server and destroys query messages, destroys inquiry and disappear Breath includes the first IMSI and the first IMEI of mobile terminal;
Specifically, after terminal starts the service of destruction, if it is false to destroy mark destroy, with first time interval, Such as sent to server within 120 seconds and destroy query messages inquiry whether there is or not destroying to require, the destruction query messages of transmission include first IMSI information and the first IMEI information, the first IMSI information preferably after md5 encryption and the first IMEI information.
Step 203, server searches bound User ID according to the first IMSI and the first IMEI;
Specifically, server receives after destroying query messages, pass through the first IMSI information carried in message and first IMEI Information Authentication binding relationships find the corresponding User ID of terminal, and in PTT_ after verification is legal by binding relationship Search whether that record is asked in the destruction for destroying the user by User ID in HEAP.YongHu_Record tables.
Step 204, server finds the first User ID in lists, by the User ID preserved in list corresponding second IMSI, and encrypted 2nd IMSI is sent to mobile terminal;
Step 205, mobile terminal judges that encrypted 2nd IMSI is consistent with local encrypted first IMSI, then moves Dynamic terminal is destroyed.
Specifically, when mobile terminal obtains the destruction confirmation message KILL_USR_CNF_MSG of server return, judge to take After whether the second IMSI information after md5 encryption of the mobile phone destroyed carried in business device return message encrypts with existing equipment The first IMSI it is consistent, if it is equal and destroy flag bit be 1, start Shredding Process.
The information deletion that exactly will locally preserve is destroyed, such as deletes the information in database file, is emptied All variables (including user account, password, IMEI, IMSI, setting option) that SharedPreferences is preserved, then by pin It ruins mark destroy and is set as true, be saved into SharedPreferences.
If network is normal, the software destruction time is sent to server.Current process is killed, and be currently running View layers, service layer processes.
If next time wishes to log on, it can prompt that " software self-destruction, is reinstalled after please unloading!", It will be unable to enter this application, software is forbidden to use.
The destroying method of the present invention can be carried out easily using local detection from destruction, or be started using server side It destroys, the information destroying that mobile terminal is preserved, so as to be effectively protected the information security of mobile terminal.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, depend on the specific application and design constraint of technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It should not be considered as beyond the scope of the present invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can use hardware, processor to execute The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above-described specific implementation mode has carried out further the purpose of the present invention, technical solution and advantageous effect It is described in detail, it should be understood that the foregoing is merely the specific implementation mode of the present invention, is not intended to limit the present invention Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include Within protection scope of the present invention.

Claims (10)

1. a kind of destroying method, which is characterized in that the method includes:
After user is successfully logged in for the first time by mobile terminal, by the First International mobile device identification code IMEI of the mobile terminal It is stored in local with First International mobile identification number IMSI, and the first broadcast is added to alarm clock and manages AlarmManager In timer and broadcast first broadcast;
Variable, which will be successfully logged in, when user is switched on is set as true;
The radio receiver of mobile terminal receives first broadcast, starts the service of destruction;
After booting, the radio receiver receives the booting self-starting broadcast of system transmission;
Judge whether the successfully login variable is true, then sends the second broadcast in this way;
When the radio receiver receives second broadcast, client identification module SIM in the mobile terminal is monitored;
If None- identified to the SIM, or the 2nd IMEI of the mobile terminal that gets with locally preserve it is described First IMEI is inconsistent, or the 2nd IMSI got and the first IMSI locally preserved inconsistent then described mobile whole It is destroyed at end.
2. according to the method described in claim 1, it is characterized in that, second broadcast of then transmission in this way specifically includes:By institute It states the second broadcast to be added in alarm clock management timer, second broadcast is sent with first time interval.
3. according to the method described in claim 1, it is characterized in that, the mobile terminal destroy specifically including:Institute State the information deletion that mobile terminal will be preserved locally.
4. according to the method described in claim 1, it is characterized in that, the method further includes:The mobile terminal will be destroyed and be marked Will is set as true, and will destroy the time and be sent to the server.
5. a kind of destroying method, which is characterized in that the method includes:
Server receives destruction and asks and preserve in lists, and destructions request includes User ID, the User ID and User password, IMIS with IMEI phases are bound;
Mobile terminal judges that it is no to destroy mark, sends to the server and destroys query messages, in the destruction query messages Including the first IMSI of the mobile terminal and the first IMEI;
The server searches bound User ID according to the first IMSI and the first IMEI;
The server finds the first User ID in the list, and the User ID preserved in the list is corresponding 2nd IMSI, and encrypted 2nd IMSI is sent to the mobile terminal;
The mobile terminal judges that encrypted 2nd IMSI is consistent with local encrypted first IMSI, then the shifting Dynamic terminal is destroyed.
6. according to the method described in claim 5, it is characterized in that, the server receives destruction request and is stored in list In after further include setting the User ID to destruction state.
7. according to the method described in claim 5, it is characterized in that, the mobile terminal destroyed query messages and include The first IMSI and the first IMEI be specially encrypted first IMSI and encrypted first IMEI.
8. according to the method described in claim 5, it is characterized in that, the server is according to the first IMSI and the first IMEI Further include whether legal verifying the first IMSI and the first IMEI before searching bound User ID.
9. according to the method described in claim 5, it is characterized in that, the mobile terminal destroy specifically including:Institute State the information deletion that mobile terminal will be preserved locally.
10. according to the method described in claim 5, it is characterized in that, the method further includes:The mobile terminal will be destroyed and be marked Will is set as true, and will destroy the time and be sent to the server.
CN201410406620.5A 2014-08-18 2014-08-18 Destroying method Active CN105451224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410406620.5A CN105451224B (en) 2014-08-18 2014-08-18 Destroying method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410406620.5A CN105451224B (en) 2014-08-18 2014-08-18 Destroying method

Publications (2)

Publication Number Publication Date
CN105451224A CN105451224A (en) 2016-03-30
CN105451224B true CN105451224B (en) 2018-09-28

Family

ID=55560918

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410406620.5A Active CN105451224B (en) 2014-08-18 2014-08-18 Destroying method

Country Status (1)

Country Link
CN (1) CN105451224B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674583A (en) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 Method for hiding or recovering personal information when changing SIM card and system thereof
EP2357859B1 (en) * 2008-11-27 2013-06-19 ZTE Corporation An authentication method for the mobile terminal and a system thereof
CN103634477A (en) * 2013-12-11 2014-03-12 深圳市亚略特生物识别科技有限公司 Method and system for preventing thievery of mobile phone with fingerprint device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2357859B1 (en) * 2008-11-27 2013-06-19 ZTE Corporation An authentication method for the mobile terminal and a system thereof
CN101674583A (en) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 Method for hiding or recovering personal information when changing SIM card and system thereof
CN103634477A (en) * 2013-12-11 2014-03-12 深圳市亚略特生物识别科技有限公司 Method and system for preventing thievery of mobile phone with fingerprint device

Also Published As

Publication number Publication date
CN105451224A (en) 2016-03-30

Similar Documents

Publication Publication Date Title
US9325704B2 (en) Data access method and device
CN109460660B (en) Mobile device safety management system
US9906513B2 (en) Network authorization system
CN100563391C (en) The method of mobile communications terminal data protection, system and equipment
CN104468611A (en) Data security processing method and device based on dual-system switching
CN104767713A (en) Account binding method, server and account binding system
CN104035891B (en) Android mobile terminal data security protection system
CN108875373B (en) Mobile storage medium file control method, device and system and electronic equipment
CN106790056A (en) Reduce the method and system of the data theft risk of data bank
CN102801731B (en) A kind of method of protected data and device
Yu et al. Remotely wiping sensitive data on stolen smartphones
CN105224262A (en) Data processing method
CN105183402A (en) Data storage method
CN102667799A (en) Access control system, authentication server system, and access control program
CN103714017A (en) Authentication method, authentication device and authentication equipment
CN105451224B (en) Destroying method
CN106911653B (en) Method, device, mobile terminal and system for realizing remote control of mobile terminal
CN103596170A (en) Method and system employing SIM card to encrypt terminal
KR20190056631A (en) System and method for managing the access of iot device based on hotp
CN108989298B (en) Equipment safety monitoring method and device and computer readable storage medium
CN106230802B (en) A kind of method that account number logs on line
WO2017197689A1 (en) Sim card processing method and apparatus, terminal, and esam chip
CN102938882A (en) Method and system changing contact information of mobile phone terminals of others by sending messages
CN107509181A (en) A kind of encryption method of SMS
WO2008089638A1 (en) Method and communication terminal of controlling user information on the communication termial

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant